Computer Awareness Quiz Set 41

Dear Applicants who are interested in practicing the Questions And Answers for Computer Awareness can check out in this set no. 41. We provided the Questions And Answers with detailed explanation.

Computer Awareness Quiz Set 41

1. ________ are used to identify a user who returns to a website.

A) ASPs

B) Scripts

C) Cookies

D) Plug-ins

Loading...

2. Which layer of OSI determines the interface of the system with the user_________

A) Network

B) Application

C) Data link

D) Session

Loading...

3. Most database management systems allow you to have more than one key so that you can sort records in different ways. One of the keys is designated the ________and must
hold a unique value for each record.

A) Unique Key

B) Prime attribute

C) Index key

D) primary key

Loading...

4. _______ is primarily used for mapping host names and email destinations to IP address but can also be used for other purposes.

A) TCP (Transfer Control Protocol)

B) DNS (Domain Name System)

C) SHA (Secure Hash Algorithm)

D) Simple Network Management Protocol (SNMP)

Loading...

5. ________ is a virus that inserts itself into a system’s memory. Then it takes a number of actions when an infected file is executed.

A) Web scripting virus

B) Polymorphic Virus

C) Resident virus

D) Boot sector virus

Loading...

6. Rows of a relation are called__________

A) Relation

B) Tuples

C) Data structure

D) An entity

Loading...

7. The ________ model remains operative until the software is retired.

A) Waterfall model

B) Incremental model

C) Spiral model

D) Prototyping model

Loading...

8. A ________ means that one record in a particular record type is related to only one record of another record type.

A) One-to-one relationship

B) One-to-many relationship

C) Many-to-one relationship

D) Many-to-many relationship

Loading...

9. A heap allows a very efficient implementation of a__________

A) Double-ended queue

B) Priority queue

C) Stack

D) Trees

Loading...

10. Which of the following TCP/IP protocol is used for remote terminal connection service?

A) Telnet

B) RARP

C) FTP

D)all of above

Loading...

11. A database management system (DBMS) is a__________

A) hardware system used to create, maintain and provide controlled access to a database

B) hardware system used to create, maintain, and provide uncontrolled access to a database.

C) software system used to create, maintain, and provide uncontrolled access to a database.

D) software system used to create, maintain, and provide controlled access to a database.

Loading...

12. To stop unauthorized access to the computer system we should_________

A) Have a trustworthy system administrator

B) Have a good passwords policy

C) Have a sound encryption policy

D) All of the above

Loading...

13. Which of the following is not a part of a standard office suit__________

A) File Manager.

B) Image Editor

C) Database

D) Word Processor

Loading...

14. An online transaction is__________

A) One that is done in real time

B) Transaction done via internet

C) One that is done via telephone

D) one that is done in access time

Loading...

15. Direct X is a ___________

A) Computer Part

B) Software that drives Graphic hardware

C) A User Interface

D) a program

Loading...

16. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits__________

A) ANSI

B) ASCII

C) EBCDIC

D) ISO

Loading...

17. How is power supplied to a low-power___________ USB device?

A) Through a power cable

B) From an external power supply

C) Directly from the computer’s power supply

D) Through the USB cable

Loading...

18. The power saving mode that allows the computer to be restarted by simply pressing a key on the keyboard is called_________

A) standby

B) warm boot

C) power management

D) cold boot

Loading...

19. Which of the following is not a usual file extension in DOS?

A) .EXE

B) .BAT

C) .Oxe

D) .class

Loading...

20. Which menu is present in WordPad but not present in notepad___________

A) Edit

B) File

C) Insert

D) View

Loading...

21. A(n) ____________ system is a small, wireless handheld computer that scans an items tag andpulls up the current price (and any special offers) as you shop.

A) PSS

B) POS

C) inventory

D) data mining

Loading...

22. Computers process data into information by working exclusively with__________

A) multimedia

B) words

C) characters

D) numbers

Loading...

23. In the binary language each letter of the alphabet, each number and each special character is made upof a unique combination of__________

A) eight bytes

B) eight kilobytes

C) eight characters

D) eight bits

Loading...

24. ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer

A) The platform

B) Application software

C) Operating system

D) The motherboard

Loading...

25. Which of the following is NOT one of the four major data processing functions of a computer?

A) gathering data

B) processing data into information

C) analyzing the data or information

D) storing the data or information

Loading...

26. A _________ contains specific rules and words that express the logical steps of an algorithm.

A) programming language

B) syntax

C) programming structure

D) logic chart

Loading...

27. Algorithm and Flow chart help us to____________

A) Know the memory capacity

B) Identify the base of a number system

C) Direct the output to a printer

D) Specify the problem completely and clearly

Loading...

28. The ability to find an individual item in a file immediately______ is used

A) File allocation table

B) Directory

C) Sequential access

D) Direct access

Loading...

29. The most frequently used instructions of a computer program are likely to be fetched from__________

A) the hard disk

B) cache memory

C) RAM

D) registers

Loading...

30. When you are working on a document on a PC, where is the document temporarily stored?